[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [ovmf baseline-only test] 38377: trouble: blocked/broken



This run is configured for baseline tests only.

flight 38377 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38377/

Failures and problems with tests :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-i386-pvops              3 host-install(3)         broken REGR. vs. 38364
 build-i386-xsm                3 host-install(3)         broken REGR. vs. 38364
 build-amd64-xsm               3 host-install(3)         broken REGR. vs. 38364
 build-amd64                   3 host-install(3)         broken REGR. vs. 38364
 build-i386                    3 host-install(3)         broken REGR. vs. 38364
 build-amd64-pvops             3 host-install(3)         broken REGR. vs. 38364

Tests which did not succeed, but are not blocking:
 build-amd64-libvirt           1 build-check(1)               blocked  n/a
 build-i386-libvirt            1 build-check(1)               blocked  n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)              blocked n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1)             blocked n/a

version targeted for testing:
 ovmf                 21c1719318056691a3e5901c6e28e5ba2b70afe2
baseline version:
 ovmf                 21f9922e3c82183f5c9030e5dbbcfc6313034471

Last test of basis    38364  2015-11-27 11:51:05 Z    1 days
Testing same since    38377  2015-11-28 08:50:30 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  "Yao, Jiewen" <jiewen.yao@xxxxxxxxx>
  Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
  Laszlo Ersek <lersek@xxxxxxxxxx>
  Mark Rutland <mark.rutland@xxxxxxx>
  Yao, Jiewen <jiewen.yao@xxxxxxxxx>

jobs:
 build-amd64-xsm                                              broken  
 build-i386-xsm                                               broken  
 build-amd64                                                  broken  
 build-i386                                                   broken  
 build-amd64-libvirt                                          blocked 
 build-i386-libvirt                                           blocked 
 build-amd64-pvops                                            broken  
 build-i386-pvops                                             broken  
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         blocked 
 test-amd64-i386-xl-qemuu-ovmf-amd64                          blocked 


------------------------------------------------------------
sg-report-flight on osstest.xs.citrite.net
logs: /home/osstest/logs
images: /home/osstest/images

Logs, config files, etc. are available at
    http://osstest.xs.citrite.net/~osstest/testlogs/logs

Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary

broken-step build-i386-pvops host-install(3)
broken-step build-i386-xsm host-install(3)
broken-step build-amd64-xsm host-install(3)
broken-step build-amd64 host-install(3)
broken-step build-i386 host-install(3)
broken-step build-amd64-pvops host-install(3)

Push not applicable.

------------------------------------------------------------
commit 21c1719318056691a3e5901c6e28e5ba2b70afe2
Author: Yao, Jiewen <jiewen.yao@xxxxxxxxx>
Date:   Fri Nov 27 13:48:12 2015 +0000

    UefiCpuPkg/PiSmmCpu: Update function call for 2 new APIs.
    
    All page table allocation will use AllocatePageTableMemory().
    Add SmmCpuFeaturesCompleteSmmReadyToLock() to PerformRemainingTasks()
    and PerformPreTasks().
    
    Contributed-under: TianoCore Contribution Agreement 1.0
    Signed-off-by: "Yao, Jiewen" <jiewen.yao@xxxxxxxxx>
    Reviewed-by: "Kinney, Michael D" <michael.d.kinney@xxxxxxxxx>
    Cc: "Fan, Jeff" <jeff.fan@xxxxxxxxx>
    Cc: "Kinney, Michael D" <michael.d.kinney@xxxxxxxxx>
    Cc: "Laszlo Ersek" <lersek@xxxxxxxxxx>
    
    git-svn-id: https://svn.code.sf.net/p/edk2/code/trunk/edk2@18981 
6f19259b-4bc3-4df7-8a09-765794883524

commit b095a5403b1dd2ad7af153069f3729716a864e80
Author: Yao, Jiewen <jiewen.yao@xxxxxxxxx>
Date:   Fri Nov 27 13:48:08 2015 +0000

    UefiCpuPkg/PiSmmCpu: Add NULL func for 2 new APIs in SmmCpuFeaturesLib.
    
    Contributed-under: TianoCore Contribution Agreement 1.0
    Signed-off-by: "Yao, Jiewen" <jiewen.yao@xxxxxxxxx>
    Reviewed-by: "Kinney, Michael D" <michael.d.kinney@xxxxxxxxx>
    Cc: "Fan, Jeff" <jeff.fan@xxxxxxxxx>
    Cc: "Kinney, Michael D" <michael.d.kinney@xxxxxxxxx>
    Cc: "Laszlo Ersek" <lersek@xxxxxxxxxx>
    
    git-svn-id: https://svn.code.sf.net/p/edk2/code/trunk/edk2@18980 
6f19259b-4bc3-4df7-8a09-765794883524

commit e3840072cd932fc1c9fc48510866534297a58dd2
Author: Yao, Jiewen <jiewen.yao@xxxxxxxxx>
Date:   Fri Nov 27 13:48:03 2015 +0000

    UefiCpuPkg/PiSmmCpu: Add 2 APIs in SmmCpuFeaturesLib.
    
    SmmCpuFeaturesCompleteSmmReadyToLock() is a hook point to
    allow CPU specific code to do more registers setting after
    the gEfiSmmReadyToLockProtocolGuid notification is completely
    processed.
    
    SmmCpuFeaturesAllocatePageTableMemory() is an API to allow
    CPU to allocate a specific region for storing page tables.
    
    Contributed-under: TianoCore Contribution Agreement 1.0
    Signed-off-by: "Yao, Jiewen" <jiewen.yao@xxxxxxxxx>
    Reviewed-by: "Kinney, Michael D" <michael.d.kinney@xxxxxxxxx>
    Cc: "Fan, Jeff" <jeff.fan@xxxxxxxxx>
    Cc: "Kinney, Michael D" <michael.d.kinney@xxxxxxxxx>
    Cc: "Laszlo Ersek" <lersek@xxxxxxxxxx>
    
    git-svn-id: https://svn.code.sf.net/p/edk2/code/trunk/edk2@18979 
6f19259b-4bc3-4df7-8a09-765794883524

commit 118930fa2888a98ee966403d8ebba6085e52c58d
Author: Laszlo Ersek <lersek@xxxxxxxxxx>
Date:   Fri Nov 27 12:00:32 2015 +0000

    Revert "Add 2 APIs in SmmCpuFeaturesLib."
    
    This reverts SVN r18958 / git commit
    9daa916dd1efe6443f9a66dfa882f3185d33ad28.
    
    The patch series had been fully reviewed on edk2-devel, but it got
    committed as a single squashed patch. Revert it for now.
    
    Link: http://thread.gmane.org/gmane.comp.bios.edk2.devel/4951
    Contributed-under: TianoCore Contribution Agreement 1.0
    Signed-off-by: Laszlo Ersek <lersek@xxxxxxxxxx>
    
    git-svn-id: https://svn.code.sf.net/p/edk2/code/trunk/edk2@18978 
6f19259b-4bc3-4df7-8a09-765794883524

commit fc8c919525d40dd332eef6adbc20bf93adb74227
Author: Laszlo Ersek <lersek@xxxxxxxxxx>
Date:   Fri Nov 27 12:00:26 2015 +0000

    Revert "Always set WP in CR0."
    
    This reverts SVN r18960 / git commit
    8e496a7abcb78c36b0af47ed473096ef7f171606.
    
    The patch series had been fully reviewed on edk2-devel, but it got
    committed as a single squashed patch. Revert it for now.
    
    Link: http://thread.gmane.org/gmane.comp.bios.edk2.devel/4951
    Contributed-under: TianoCore Contribution Agreement 1.0
    Signed-off-by: Laszlo Ersek <lersek@xxxxxxxxxx>
    
    git-svn-id: https://svn.code.sf.net/p/edk2/code/trunk/edk2@18977 
6f19259b-4bc3-4df7-8a09-765794883524

commit 83886d746e72063e8ef09cbd6d9884fba2c7bad6
Author: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
Date:   Fri Nov 27 09:24:27 2015 +0000

    ArmPlatformPkg/PrePeiCore: add missing entries to AArch64 vector table
    
    The PrePeiCore vector table for AArch64 mode is only half populated.
    However unlikely, if exceptions from lower exception levels are ever
    taken, they should be reported correctly, rather than causing a
    recursive undefined instruction fault on the zero padding that was
    introduced by commit SVN r18904 ("ArmPkg/ArmPlatformPkg: position
    vectors relative to base"). So add the missing entries, and wire
    them up to the default handler.
    
    Contributed-under: TianoCore Contribution Agreement 1.0
    Signed-off-by: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
    Acked-by: Mark Rutland <mark.rutland@xxxxxxx>
    Reviewed-by: Leif Lindholm <leif.lindholm@xxxxxxxxxx>
    
    git-svn-id: https://svn.code.sf.net/p/edk2/code/trunk/edk2@18976 
6f19259b-4bc3-4df7-8a09-765794883524

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.